A secure, tamperproof execution environment is critical for trustworthy network computing. Newly emerging hard-ware, such as those developed as part of the TCPA and Pal-ladium initiatives, enables operating systems to implement such an environment through Merkle hash trees. We exam-ine the selection of optimal parameters, namely blocksize and tree depth, for Merkle hash trees based on the size of the memory region to be protected and the number of memory updates between updates of the hash tree. We analytically derive an expression for the cost of updating the hash tree, show that there is an optimal blocksize for the leaves of a Merkle tree for a given filesize and update interval that min-imizes the cost of update operations, and describe...
Abstract. Replay attacks are often the most costly attacks to thwart when dealing with off-chip memo...
During the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiqu...
A Merkle tree is a data structure employed within Blockchain technology to securely verify informati...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
A secure, tamper proof execution environment is critical for trustworthy network computing. Newly ...
Single Chip Secure Processors have recently been proposed for variety of applications ranging from a...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), sig...
In this paper we propose two new constructions for pro-tecting the integrity of files in cryptograph...
Memory integrity protection is crucial for many applications that store critical data in the memory....
Securing off-chip main-memories is an integral component of trusted-execution environments like Inte...
AbstractIn this paper we describe optimal trade-offs between time and space complexity of Merkle tre...
Merkle grids are a new data organization that replicates the functionality of Merkle trees while red...
A cryptographic network file system has to guarantee confidentiality and integrity of its files, and...
There is a common problem of operating on hash values of elements of some database. In this paper th...
Abstract. Replay attacks are often the most costly attacks to thwart when dealing with off-chip memo...
During the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiqu...
A Merkle tree is a data structure employed within Blockchain technology to securely verify informati...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
A secure, tamper proof execution environment is critical for trustworthy network computing. Newly ...
Single Chip Secure Processors have recently been proposed for variety of applications ranging from a...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), sig...
In this paper we propose two new constructions for pro-tecting the integrity of files in cryptograph...
Memory integrity protection is crucial for many applications that store critical data in the memory....
Securing off-chip main-memories is an integral component of trusted-execution environments like Inte...
AbstractIn this paper we describe optimal trade-offs between time and space complexity of Merkle tre...
Merkle grids are a new data organization that replicates the functionality of Merkle trees while red...
A cryptographic network file system has to guarantee confidentiality and integrity of its files, and...
There is a common problem of operating on hash values of elements of some database. In this paper th...
Abstract. Replay attacks are often the most costly attacks to thwart when dealing with off-chip memo...
During the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiqu...
A Merkle tree is a data structure employed within Blockchain technology to securely verify informati...